Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27025: CWE-834: Excessive Iteration in py-pdf pypdf

0
Medium
VulnerabilityCVE-2026-27025cvecve-2026-27025cwe-834
Published: Fri Feb 20 2026 (02/20/2026, 21:11:20 UTC)
Source: CVE Database V5
Vendor/Project: py-pdf
Product: pypdf

Description

CVE-2026-27025 is a medium severity vulnerability in the pypdf library versions prior to 6. 7. 1. It involves excessive iteration when parsing the /ToUnicode entry of fonts in crafted PDF files, leading to long runtimes and high memory consumption. This can cause denial of service conditions during text extraction without requiring user interaction or privileges. The vulnerability is fixed in version 6. 7. 1. Exploitation requires an attacker to supply a malicious PDF to a system using a vulnerable pypdf version. No known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 02/20/2026, 23:01:54 UTC

Technical Analysis

The vulnerability CVE-2026-27025 affects pypdf, a widely used open-source pure-Python library for PDF processing. The issue arises from excessive iteration (CWE-834) when parsing the /ToUnicode entry of font objects within a PDF. An attacker can craft a PDF file with unusually large or complex /ToUnicode mappings, which causes the pypdf library to consume excessive CPU time and memory during text extraction operations. This leads to performance degradation and potential denial of service (DoS) on systems processing such PDFs. The flaw does not require any authentication, user interaction, or elevated privileges to exploit, but the attacker must supply the malicious PDF to the target environment. The vulnerability was addressed and fixed in pypdf version 6.7.1. The CVSS v4.0 base score is 6.9 (medium severity), reflecting local attack vector, low attack complexity, no privileges or user interaction required, and high impact on availability. No known exploits have been reported in the wild as of now.

Potential Impact

Organizations using pypdf versions prior to 6.7.1 are at risk of denial of service attacks if they process untrusted or malicious PDF files. This can affect applications performing automated PDF text extraction, indexing, or analysis, potentially causing service outages or degraded performance due to resource exhaustion. The impact is primarily on availability, with no direct confidentiality or integrity compromise reported. Systems that automatically ingest PDFs from external sources, such as document management systems, email gateways, or web applications, are particularly vulnerable. The resource exhaustion could lead to crashes or slowdowns, affecting business continuity and user experience. While no exploits are known in the wild, the ease of crafting malicious PDFs and the lack of required privileges make this a credible threat, especially in environments processing large volumes of PDFs.

Mitigation Recommendations

The primary mitigation is to upgrade all pypdf library instances to version 6.7.1 or later, where the vulnerability is fixed. Organizations should audit their software dependencies to identify and update vulnerable versions. Additionally, implement strict input validation and sandboxing for PDF processing workflows to isolate potential resource exhaustion. Rate-limit or quarantine PDF files from untrusted or external sources before processing. Employ monitoring to detect unusual CPU or memory usage spikes during PDF handling. Where possible, use alternative PDF processing libraries with robust parsing and resource controls. Finally, maintain an inventory of applications and services using pypdf to ensure timely patching and reduce attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-17T03:08:23.490Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6998e47bbe58cf853bd9f767

Added to database: 2/20/2026, 10:47:23 PM

Last enriched: 2/20/2026, 11:01:54 PM

Last updated: 2/20/2026, 11:49:34 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats